Operational Technology (OT) refers to all the subsystems needed to manage and monitor a physical process, for example at a power station or a factory. OT usually consists of programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems. IT refers to the business and office systems that most organizations use.
Historically, OT systems were often entirely standalone. However, the need to connect OT to other systems has grown with the digitalization of society. IT and OT are therefore connected, and similar technology is often used in IT and OT. The different needs in IT and OT can easily lead to challenging technical conflicts.
Operational Technology (OT) refers to all the subsystems needed to manage and monitor a physical process, for example at a power station or a factory. OT usually consists of programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems. IT refers to the business and office systems that most organizations use.
Historically, OT systems were often entirely standalone. However, the need to connect OT to other systems has grown with the digitalization of society. IT and OT are therefore connected, and similar technology is often used in IT and OT. The different needs in IT and OT can easily lead to challenging technical conflicts.
Separating IT and OT into separate segments helps avoid vulnerabilities or disruption in IT affecting OT. To avoid risks as a consequence of mistakes in configuration or function, physical segmentation (zoning) should be used. This means that separate hardware is used for IT and OT.
The most secure way to connect an integrity sensitive data network to other systems is to use data diodes. All data flows from OT that can be managed with data diodes involve a simplified security analysis, quite simply because a data diode is so secure and easy to analyses. Or, more correctly, because it has such high assurance. :
For data flows for which data diodes are not suitable, you can instead use systems that secure the information flow, such as Zone Guard. To avoid malicious code intruding and affecting the process, it is important to have strict separation between, and monitoring of, all data flows across the zone border. The most secure method is to have strict control over the information that is permitted to cross the zone border. For example, by not allowing transport protocols to pass the zone border, you entirely avoid many of the risks that you might otherwise face.
By physically zoning IT and OT and using data diodes and Zone Guards in the zone border, you achieve an optimum balance between function and security. Consequently, you can accelerate the digitalization process without risking the availability of OT, and you also avoid having to spend time and effort on analyzing any of the outbound flows from OT. Choosing data diodes and Zone Guards gives you a future-proof solution that is considerably less likely to need change over time than a solution based on traditional firewalls and intrusion detection systems. To read more about our data diodes and Zone Guard, please visit advenica.com.